Vulnerability Description
Argument injection vulnerability in certain PHP 3.x, 4.x, and 5.x applications, when used with sendmail and when accepting remote input for the additional_parameters argument to the mail function, allows remote attackers to read and create arbitrary files via the sendmail -C and -X arguments. NOTE: it could be argued that this is a class of technology-specific vulnerability, instead of a particular instance; if so, then this should not be included in CVE.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Php | Php | 3.0 |
References
- http://secunia.com/advisories/19979
- http://securityreason.com/securityalert/517
- http://www.novell.com/linux/security/advisories/05-05-2006.html
- http://www.securityfocus.com/archive/1/426497/100/0/threaded
- http://www.securityfocus.com/bid/16878
- http://secunia.com/advisories/19979
- http://securityreason.com/securityalert/517
- http://www.novell.com/linux/security/advisories/05-05-2006.html
- http://www.securityfocus.com/archive/1/426497/100/0/threaded
- http://www.securityfocus.com/bid/16878
FAQ
What is CVE-2006-1015?
CVE-2006-1015 is a vulnerability with a CVSS score of 6.4 (MEDIUM). Argument injection vulnerability in certain PHP 3.x, 4.x, and 5.x applications, when used with sendmail and when accepting remote input for the additional_parameters argument to the mail function, all...
How severe is CVE-2006-1015?
CVE-2006-1015 has been rated MEDIUM with a CVSS base score of 6.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-1015?
Check the references section above for vendor advisories and patch information. Affected products include: Php Php.